What are characteristic features of satellite internet connections? (select 3 answers)

Which of the following solutions enables simultaneous digital transmission of voice, video, data, and other network services over a PSTN?

ISDN

T1 lines support data transfer rates of up to:

1.544 Mbps

Which of the answers listed below refers to the maximum data transfer rate of E1 connection?

2.048 Mbps

T3 lines support data transfer rates of up to:

44.736 Mbps

Which of the following answers refers to the maximum data transfer rate of E3 connection?

34.368 Mbps

Optical Carrier (OC) transmission rate specifications adhere to a pattern where the OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps.

True

An OC-3 line supports transmission rates of up to:

155.52 Mbps

Which of the answers listed below refers to the maximum data transfer rate of OC-192 connection?

9953.28 Mbps (9.95 Gbps)

What is the most common type of a DSL Internet access?

ADSL

The term "Metropolitan Ethernet" refers to an Ethernet-based Metropolitan Area Network (MAN).

True

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as:

Cable broadband

Which of the following Internet access types takes advantage of the traditional analog telephone lines?

Dial-up

Which of the answers listed below refers to an ISDN service designed for larger organizations that take advantage of digital PBX systems?

PRI

What are the characteristic features of satellite Internet connections? (Select 3 answers)

High signal latency

Interference (weather dependent)

Relatively high cost in comparison to terrestrial links

Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses?

arp -a

The arp command can be used to perform what kind of resolution?

IP to MAC

Which command-line command in MS Windows is used to display the contents of a routing table?

route print

Which network command-line utility in MS Windows combines the features of ping and tracert?

pathping

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?

-b

Which of the netstat utility parameters listed below allows to display the contents of an IP routing table?

-r

Which netstat parameter allows to display all active TCP connections and the TCP/UDP ports on which the computer is listening?

-a

Which of the answers listed below refer to iptables? (Select 2 answers)

Linux command-line tool

Packet filtering utility

Which of the following command-line commands in MS Windows are used for resetting the DHCP configuration settings for all adapters? (Select 2 answers)

ipconfig /release

ipconfig /renew

Which ipconfig parameter allows to view the physical address of a Network Interface Card (NIC)?

/all

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?

/all

Which of the following network administration command-line utilities can be used for DNS queries?

nslookup

Which of the software tools listed below allows for obtaining a domain name to IP address mapping?

nslookup

Domain information groper (dig) and nslookup are command-line tools used for DNS queries. Both utilities are available on Windows and Linux. Of the two, nslookup is the preferred tool on UNIX-like systems; dig is the default DNS query tool for MS Windows.

False

Troubleshooting Steps

1. Identify the problem.
2. Establish a theory of probable cause.
3. Test the theory to determine cause.
4. Establish a plan of action to resolve the problem and identify potential effects.
5. Implement the solution or escalate as necessary. 6. Verify full system functionality, and if applicable, implement preventative measures.
7. Document findings, actions, and outcomes.

OBVIOUS CAUSES:

Port speed, Port duplex mismatch, Mismatched MTU, Incorrect VLAN, Incorrect IP address/duplicate IP address, Wrong gateway, Wrong DNS, Wrong subnet mask, Incorrect interface/interface misconfiguration, Duplicate MAC addresses, Expired IP address, Rogue DHCP server, Untrusted SSL certificate, Incorrect time, Exhausted DHCP scope, Blocked TCP/UDP ports, Incorrect host-based firewall settings, Incorrect ACL settings, Unresponsive service

Vulnerability scanning: (Select 3)

Identifies lack of security controls

Actively tests security controls

Identifies common misconfigurations

Exploits vulnerabilities

Passively tests security controls

Identifies lack of security controls

Identifies common misconfigurations

Passively tests security controls

Which of the following answers refers to a set of bug fixes or code enhancements available in the form of a single installable package?

In the patch management process, an unwanted change introduced by an update can typically be reverted via rollback feature which allows for restoring an application or system to a state prior to the update.

Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications?

LACP
DSCP
SIEM
HIDS

An SNMP-compliant device includes a virtual database containing information about configuration and state of the device that can be queried by an SNMP management station. This type of data repository is referred to as:

MIB
DCS
NMS
SIEM

CRC allows for collecting metrics that provide information on:

Error rates
Network utilization
Packet drops
Bandwidth/throughput

SNMP is an application layer protocol that provides communicates with the Network Management Stations or NMS and stores info on the MIB DB.

NMS can periodically query SNMP for stats with the GET message command "snmpwalk"v

The syslog allows you to display, sort, and even search messages to help with troubleshooting.

The syslog uses key words and severity levels.

syslog Severity Levels
7 - Debugging message - Debugging recommended
6 - Information - Normal
5 - Notification - Normal but significant condition
4 - Warning - Warning condition

syslog Severity Levels
3 - Error - condition errors
2 - Critical - critical condition
1 - Alert - Immediate action is needed
0 - Emergency - system is unusable

CSMA/CD is used in 802.3 standards

CSMA/CA is used in 802.11 standards

CSMA/CA is commonly used in wireless networks

CSMA/CD is used in wired networks

What is a characteristic of satellite Internet?

Satellite internet is a wireless connection that involves 3 satellite dishes; one at the internet service providers hub, one in space and one attached to your property. In addition to the satellite dish you also need a modem and cables running to and from the dish to your modem.

Which are types of internet connections choose three answers?

The most common types of internet connections include:.
DSL (digital subscriber line).
cable broadband..
fibre optic broadband..
wireless or Wi-Fi broadband..
satellite and mobile broadband..
dedicated leased line..

What is required for a satellite Internet connection?

Satellite internet does not require a phone line, a cable connection, or any other special wiring in your home. All that's required is electricity to power the receiver dish, a place to mount it outside your home and an unobstructed view of the sky.

What is satellite network connection?

Satellite internet is a type of connection that uses a satellite to get an internet signal from your internet service provider (ISP) to you. Here's how it works: your provider sends a fiber internet signal to a satellite in space. The internet signal then comes to you and is captured by your satellite dish.